Modal title

Modal body text goes here.

The Fortinet Certified Trainer (FCT) assessment is a trainer evaluation process in which each candidate has to prove their training delivery skills. The FCT assessment is a two-day assessment that evaluates the FCT candidate’s ability to maintain Fortinet’s quality standards in technical knowledge, skills and instructional abilities.

Who can apply?

The FCT assessment candidate should be a Fortinet employee or a candidate sponsored by an ATC who has submitted proof of reference, along with an online application form. An FCT candidate who wants to apply for an FCT assessment must meet the following knowledge and experience eligibility requirements:

  • Extensive technical knowledge and skills in network security and cybersecurity
  • Five years of relevant experience in network security and cybersecurity
  • Certification in the required NSE training courses
  • Five years of experience in training delivery in IT security
  • Demonstrable training facilitation and delivery skills

If you meet all of these requirements you can apply for the FCT assessment!

Please contact fct@fortinet.com for queries and suggestions.

Skip to main content
Training Institute
  • Library
  • Schedule
  • Certifications
  • ATC
  • Academic Partner Program
  • Fast Track Workshops
  • Log in
  • Training

Fast Track Workshop Abstracts

AI Driven Security Operations

Breaking the Kill Chain with AI-Driven Breach Protection

According to FortiGuard labs, there are three key areas that attackers are investing in, AI-based malware creation, self-learning swarms and automated malware delivery. To address these challenges, customers have told us that they need an agile platform, that supports a plug and play approach, so they can update the security infrastructure on their time table. Most importantly allow them to automate processes as much as possible. This is where the Foritnet Security Fabric can really help. It provides broad visibility to identify advanced attacks across the entire attack surface, integrated AI-driven security solutions that all work cohesively together to provide protection and it allows organization to achieve an automated and coordinated threat response. These are the key ingredients to building an effective breach protection strategy.

Attend this hands-on technical training workshop to learn how providing AI-Driven Breach Protection can break the kill chain and help protect an organization’s network.

This solution covers:

  • Detecting Zero-Day Malware with Sandboxing (FortiSandbox)
  • Sub-Second Threat Investigation and Response with AI Powered Cybersecurity (FortiAI)
  • Deceive, Expose and Eliminate External and Internal Threats with Deception-based Breach Protection (FortiDeceptor)
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about FortiSandbox and teach participants how FortiSandbox detects and reports on advanced threats.

Empowering Security Operations Leveraging SOAR

To address the constantly evolving threat landscape, the complexity of security products, and the scarcity of cyber security skills/staff, organizations must be able to aggregate and enrich alerts from a wide range of security products. In addition, they need to automate repetitive tasks and leverage well-defined playbooks to guide fast incident response to maximize the efficiency of their security operations team.

FortiSOAR is a holistic and enterprise-built security orchestration and security automation workbench that empowers security operation teams. FortiSOAR increases a team’s effectiveness by increasing efficiency, allowing for response in near real time.

In this workshop, participants learn how FortiSOAR takes your security operation team to the next level by automating the incident response process and facilitating collaboration, all behind a single console.

Participants who attend this workshop will learn how to:

  • Address the staff and skills shortage by automating routine tasks to preserve scarce expertise for critical incidents
  • Combat complexity with connectors that easily integrate with deployed security controls to ingest information and provide a single, centralized point of visibility and control
  • Avoid alert fatigue by aggregating security alerts in one place, enriching them with added context to speed investigation, and including playbooks to guide the triage process
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about the Fortinet Security Fabric and teach participants how to automate repetitive tasks and leverage well-defined playbooks to guide fast incident response to maximize the efficiency of their SOC team.

Powerful Security Information and Event Management with SIEM

Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate, including infrastructure, applications, VMs, cloud, endpoints, and IoT, means the attack surface grows exponentially. Coupled with a skills shortage and resource constraints, security becomes everybody’s problem, but visibility, event correlation, and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in real time – but also requires context: what devices represent a threat and what are their capabilities. All this is necessary to manage the threat the business faces and the noise multiple security tools create.

In this workshop, participants learn how FortiSIEM, the Fortinet multi-vendor security incident and events management solution, brings it all together by integrating NOC and SOC solutions to automate IT processes and security responses. Visibility, correlation, and remediation all come in a single, scalable solution. Using FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources and improving breach detection. Worldwide, 80% of breaches go undetected because of skills shortage and event information noise. FortiSIEM provides the cross correlation, machine learning, and user and entity behavior analytics (UEBA) to improve overall response and effectively stop breaches before they occur.

Participants who attend this workshop will learn how to:

  • Understand FortiSIEM architecture
  • Use FortiSIEM features
  • Run analytic searches
  • Use rapid detection and remediation of security events
  • Use security and performance management
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience on FortiSIEM and teach participants how to improve security and performance management, plus rapidly detect and remediate security incidents via automated responses.

Performance and Security Testing

Cyberattacks are a 24/7 reality. The complexity and growth of the enterprise estate, including infrastructure, applications, VMs, cloud, endpoints, and IoT, means the attack surface grows exponentially. Coupled with a skills shortage and resource constraints, security becomes everybody’s problem, but visibility, event correlation, and remediation are other people’s responsibility. Effective security requires visibility – all the devices, all the infrastructure in real time – but also requires context: what devices represent a threat and what are their capabilities. All this is necessary to manage the threat the business faces and the noise multiple security tools create.

In this workshop, participants learn how FortiSIEM, the Fortinet multi-vendor security incident and events management solution, brings it all together by integrating NOC and SOC solutions to automate IT processes and security responses. Visibility, correlation, and remediation all come in a single, scalable solution. Using FortiSIEM, the complexity of managing network and security operations is reduced, freeing resources and improving breach detection. Worldwide, 80% of breaches go undetected because of skills shortage and event information noise. FortiSIEM provides the cross correlation, machine learning, and user and entity behavior analytics (UEBA) to improve overall response and effectively stop breaches before they occur.

Participants who attend this workshop will learn how to:

  • Understand FortiSIEM architecture
  • Use FortiSIEM features
  • Run analytic searches
  • Use rapid detection and remediation of security events
  • Use security and performance management
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience on FortiSIEM and teach participants how to improve security and performance management, plus rapidly detect and remediate security incidents via automated responses.

Simplify SOC with Security Fabric Analytics and Automation

The Fortinet Security Fabric provides a solution to these security challenges. Broad visibility and control of an organization’s entire digital attack surface minimizes risk. An integrated solution reduces the complexity of supporting multiple point products. Automation of security workflows increases the speed of operation. All of these features enable an organization to maximize the impact and effectiveness of a lean security team.

FortiAnalyzer, a core part of the Security Fabric, enables teams to simplify security operations, enabling enterprises at any stage of security operations center (SOC) maturity to smoothly integrate security visibility and automation.

In this Fast Track attendees will gain hands-on experience and see how the solution provides organizations with advanced logging and reporting, Security Fabric analytics and Security Fabric automation.

Participants who attend this workshop will learn how to:

  • Understand the benefits of using FortiAnalyzer to simpligy SOC operations.
  • How to use playbooks to automate workflows in order reduce the work load on the security team.
  • How to use FortiGate event handlers to automate actions via automation stitches.
  • How to work with analytics logs and generate custom reports.
Format 4-hour technical workshop
Objective FortiAnalyzer, a core part of the Security Fabric, enables teams to simplify security operations, enabling enterprises at any stage of security operations center (SOC) maturity to smoothly integrate security visibility and automation.

Attend this technical training workshop and gain hands-on experience and see how the solution provides organizations with advanced logging and reporting, Security Fabric analytics and Security Fabric automation.

Challenge

Attack and Defense Methodologies

Cyber criminals are increasingly leveraging advanced tools as part of their cyberattacks, heightening the risk of a security incident or a data breach. In turn, some CISOs are adopting sophisticated solutions, such as AI-powered sandboxing, as an essential component of their security strategy. Developing a suitable defense methodology helps combat previously unknown threats such as ransomware, crypto-malware, and many others.

Participants who attend this workshop will learn how to:

  • Understand the anatomy of an attack, also known as a kill chain
  • Understand the tools and techniques threat actors use to breach an organization
  • Attack a fictitious organization using these tools
  • Deploy the Fortinet Security Fabric to protect against known and unknown threats
Format Half-day technical workshop
Objective Provide a compelling, hands-on learning experience about who threat actors are, what tools and methodologies they use, and how to use the Security Fabric to break the kill chain. Participants will compete in teams against each other to see who can obtain the most posts.

Dynamic Cloud Security

Application Delivery Control Without Limits

In this workshop, participants explore the ways in which to deploy FortiADC to provide secure, efficient, scalable, and reliable access to business critical applications. Participants will be able to deploy a single data center application delivery controller, expand to a global load balancing solution, implement SSL offloading, and implement firewall security.

Participants who attend this workshop will learn how to:

  • Introduce the FortiADC product family
  • Simplify scalability of web applications within the datacenter
  • Provide global redundancy for web applications
  • Improve performance of web applications through mechanisms such as SSL Offloading
  • Protect and secure web applications with built in firewall, WAF, and more
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about how FortiADC can provide secure, reliable, and scalable access to all web applications, while improving overall performance and responsiveness of those same applications.

Advanced Email Security Solution

Email security remains a key productivity tool for today's organizations, as well as a successful attack vector for cyber criminals. According to the Verizon 2019 Data Breach Investigations Report, 94% of malware was delivered via malicious emails. Gartner asserts that "advanced threats (such as ransomware and business email compromise) are easily bypassing the signature-based and reputation-based prevention mechanisms that a secure email gateway (SEG) has traditionally used."

Participants who attend this workshop will learn how to:

  • Understand how FortiMail can stop advanced threats
  • Understand the key benefits of Office 365 integration
  • Leverage CTAP for email
  • Gain hands-on experience with FortiMail
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about FortiMail and teach how to protect your organization from phishing, unwanted spam, social engineering, business email compromise, malware, and advanced targeted attacks via email.

Achieve PCI DSS Compliance for Web Applications

The goal of the Payment Card Industry Data Security Standard (PCI DSS), established in 2004, is to protect cardholder data and reduce credit card fraud. These policies and procedures should be followed by every organization that accepts credit cards.

Participants who attend this workshop will learn how to:

  • Understand the PCI DSS compliance requirements
  • Use FortiWeb features to address many of the PCI DSS compliance requirements
  • Implement specific FortiWeb features to address specific PCI DSS requirements
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about how FortiWeb can help participants reduce the complexities of achieving PCI DSS compliance for their business or customers.

Defend and Protect Against Disruptions to Your Infrastructure

Distributed Denial of Service (DDoS) attacks remain a top threat to network security, and have evolved in almost every way, to do what they do best: shut down access to your vital online services. Unlike intrusion and malware attacks, DDoS attackers have learned that they don’t need to attack only end-point servers to shut you down. They attack any IP address that routes to your network: unused IP addresses, ISP link subnets, or Firewall / Proxy / WiFi Gateway public IP addresses. CDN and DNS-based cloud mitigation cannot protect you from these attacks.

What is the impact to your business if your users cannot reach cloud services because your firewall is DDoSed? Sophisticated multi-vector and multi-layer DDoS attacks use direct and reflected packets where the spoofed, randomized source IP addresses are impossible to ACL. These attacks are increasingly common as Mirai-style code has morphed into many variants and has been commercialized by providers of “stresser” sites. Anyone can create large, anonymous attacks for a few dollars. DDoS is not an everyday occurrence for security teams, and they cannot be expected to understand the thousands of attack variants that target your network. To combat these attacks, you need a solution that dynamically and automatically protects a large attack surface.

Participants who attend this workshop will learn how to:

  • Setup and configure FortiDDoS from scratch
  • Configure Service Protection Profiles and protection sub-nets
  • Generate and characterize an attack
  • Reduce false positive DDoS attacks
  • Differentiate between FortiDDoS and Statefull firewalls
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about FortiDDos and teach how to protect your organization from DoS attacks

Fabric Management

Streamlining Automation Using WebServices APIs

Automation is key to successfully defending against today's advanced threats.  In addition, cloud and hybrid-based architectures require automation to guarantee that management and security are not an inhibitor to these platforms benefits.

Fortinet Web Services APIs are an ideal way to automate repetitive and complex tasks in dynamic environments.

Participants who attend this workshop will learn how to:

  • Understand the benefits of various Web Services APIs
  • Construct methods to configure and deploy FortiManager policies
  • Construct methods to configure and deploy FortiGate policies
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about FortiDDos and teach how to protect your organization from DoS attacks

Creating a Comprehensive Security Fabric

Networks today are expanding rapidly. At the same time, the threat landscape is growing faster than ever. Having security that solves the challenges of today’s highly adaptive threat landscape, while protecting the entire dynamic environment, is more critical than ever.

Participants who attend this workshop will learn how to:

  • Introduce the Fortinet Security Fabric and discuss the main business drivers
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about the Fortinet Security Fabric that teaches participants how to craft a comprehensive security solution that solves the challenges of today’s highly adaptive threat landscape while protecting the entire dynamic environment.

Reduce the Complexity of Operations with the Fabric Management Center

The Fabric Management Center solution provides powerful automation-ready single pane of glass management and visibility, advanced compliance reporting, and network-aware rapid response across on-premises, cloud, and hybrid environments.  The Fabric Management Center solution has been tested for more than a decade and is deployed by thousands of customers around the world across all major industry verticals.

Participants who attend this workshop will learn how to:

  • Understand the benefits of using Fabric Management Center solution
  • Reduce operational complexity and security risk by simplifying and automating deployment and network monitoring
  • How to centrally manage device’s configuration and policies, IPSec VPNs and SD-WAN using the GUI and scripts
  • Improve time to compliance readiness with pre-built reports, as well as how to customize and create new reports
  • How to reduce risk by automating response to security events with network-aware response actions.
Format 4-hour technical workshop
Objective The Fabric Management Center solution provides powerful automation-ready single pane of glass management and visibility, advanced compliance reporting, and network-aware rapid response across on-premises, cloud, and hybrid environments.

Attend this technical training workshop and gain hands-on experience implementing the solution’s key capabilities and applying them to centrally manage a fictitious organization’s HQ and Branch networks from a single pane of glass.

Security Driven Networking

What's New in FortiOS

To address today’s risks and deliver the industry’s most comprehensive cybersecurity platform that enables digital innovation, Fortinet continues to enhance the Fortinet Security Fabric with the latest version of its operating system, FortiOS. The Fortinet Security Fabric is the result of almost 20 years of innovation, organically built from the ground up to be broad, integrated, and automated. Every element of the Security Fabric—from the next-generation firewalls, to the access points and switches, to the network access control (NAC) solution—is engineered to work together, while also integrating with one of the industry’s largest technology alliance partner ecosystems.

Participants who attend this workshop will learn how to:

  • Use the Security Fabric improvements to provide IT teams with a holistic view into devices, traffic, applications, and events, in addition to the ability to stop a threat anywhere along its attack chain
  • Enable the sharing and correlation of real-time threat intelligence is by integrating devices using open standards, common operating systems, and unified management platforms
  • Use the Security Fabric to automatically provide continuous trust assessment and then provide an immediate, coordinated response to detected threats.
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about the new features and capabilities that have been added to FortiOS, including features for expanding the Security Fabric, cloud and SDN, automation and DevOps, and SaaS and SD-WAN.

Introduction to Fortinet Network Security

Today’s networks are highly complex environments with borders that are constantly changing. In response to this highly complex environment, firewalls have become robust multi-functional devices that counter an array of threats to your network.

Participants who attend this workshop will learn how to:

  • Install a FortiGate device in a network
  • Configure basic routing
  • Create security policies
  • Apply security scanning
  • Configure local user authentication
  • Use the CLI
  • Configure the Fortinet Security Fabric
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about the FortiGate that covers the basics of how to install and configure the FortiGate, including security profiles, authentication, and the Fortinet Security Fabric.

Constructing a Secure SD-WAN Architecture

Corporate networks are stretched thin by cloud services, SaaS applications, and mobility. Plus, organizations require better connections to branch offices to deliver higher-quality network services.

Participants who attend this workshop will learn how to:

  • Apply software-defined networking (SDN) to software control of wide area networks in an enterprise environment
  • Implement application control and traffic shaping over SD-WAN
  • Use FortiManager to enable unified policy across multiple of enterprise branches
  • Configure virtualized products supporting WAN aggregation while gaining hand-on experience
Format 4-hour technical workshop
Objective Provide a compelling hands-on learning experience about SD-WAN and teach participants to understand an agile and cost-effective architectural network solution.

Protecting and Accelerating User Web Access

In today’s networks, HTTPS/SSL Traffic percentage has increased dramatically along with number of social websites, risky content on the internet and attacks. This increase brings the need of protection from internet born threat, drive growth of web security market and the need of acceleration of Web Traffic.

FortiProxy is a secure web proxy that protects employees against internet-borne attacks by incorporating multiple detection techniques such as web filtering, DNS filtering, data loss prevention, antivirus, intrusion prevention, and advanced threat protection. It helps enterprises enforce internet compliance using granular application control. Content Analysis Enforce acceptable usage by detecting and preventing illicit images and videos with AI-driven content analysis

FortiProxy has a powerful hardware that can perform SSL inspection to effectively remove blind spots in encrypted traffic, without compromising on performance. FortiProxy uses specialized ASICs to accelerate performance of the network and security modules. FortiProxy supports proxy speeds up to 15 Gbps and can scale from small enterprises with 500 users all the way to larger enterprises of 50,000 users.

Format 4-hour technical workshop
Objective Provide a compelling hands-on learning experience about FortiProxy and FortiAnalyzer while teaching participants how to set up FortiProxy Web proxy functionality and how to use FortiAnalyzer reports.

SD-Branch: LAN Edge Wired and Wireless

Enterprise networking and security teams are struggling with evolving their WAN and branch office IT architecture to support digital transformation. A typical branch office consists of multiple point products, creating both security and complexity challenges. IT teams are looking to consolidate these point products to increase agility and save money, while improving the security and visibility of network access at the branch office.

  • Create a FortiLink interface
  • Authorize FortiSwitch and FortiAP devices
  • Create VLANs and policies
  • Create SSIDs
  • Configure radio frequency (RF) parameters
  • Assign firewall policies to FortiGate interfaces

Participants who attend this workshop will learn how to:

Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about SD-Branch solution with FortiSwitch, FortiAP, and FortiLink to teach participants the benefits of integrating the devices using FortiLink and how to enable a common security policy across the network, extending the protection of the firewall out to the edge.

Fortifying the Enterprise Network (NGFW Solution)

As security architects consider how to provide comprehensive threat protection for their enterprises, including intrusion prevention, web filtering, anti-malware, and application control, they face a major complexity hurdle managing these point products with no integration and lack of visibility.

Participants who attend this workshop will learn how to:

  • Reduce complexity with industry-leading security effectiveness
  • Enhance visibility with automated action
  • Simplify SSL performance and complexity issues for encrypted cloud access
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about the Fortinet NGFW and teach participants how to fortify your enterprise network with the Fortinet NGFW solution, which solves the challenges of today’s highly adaptive threat landscape, provides enhanced visibility into cloud applications and IoT devices, and protects the entire dynamic environment with automated action.

Cybersecurity for Safe, Reliable, Secure Industrial Control Systems (ICS)

Connections between IT and operational technology (OT) systems are no longer air gapped, introducing the potential for hackers to penetrate industrial control systems, risking the safety and availability of critical infrastructure. Security for OT requires visibility, control, and analytics to meet safety and availability requirements.

Participants who attend this workshop will learn how to:

  • Introduce the OT business drivers and security priorities
  • Understand the differences between IT and OT and the importance of actively securing OT environments
  • Leverage the Purdue Model to support the needs of an OT environment
  • Apply the Security Fabric to secure OT
  • Expand the Security Fabric and enhance the value of Fabric-ready partners
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about the Security Fabric and teach participants how to craft a comprehensive security solution that solves safety and availability needs of OT and control systems.

Zero Trust Access

Securely Embrace the IoT Revolution with NAC

Network Access Control (NAC) has come back to the forefront of security solutions to address that challenge. This technology was deployed to assist with bring your own device (BYOD) policies and is now getting renewed focus as a means to safely accommodate headless IoT devices in the network. FortiNAC enables three key capabilities to secure IoT devices:

  • Network visibility to see every device and user as they join the network
  • Network control to limit where devices can go on the network
  • Automated response to speed the reaction time to events from days to seconds

Collectively, these three capabilities provide the tools that network owners need to secure a world that is embracing IoT.

Participants who attend this workshop will learn how to:

  • Discuss the business drivers and security challenges that customers face
  • Identify the key capabilities, use cases, sales strategies, and competitive advantages of FortiNAC
  • Understand the fundamental feature set of FortiNAC
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience for FortiNAC and teach participants how to enhance the Fortinet Security Fabric and protect against IoT threats.

Fortinet Teleworker Solution Engineered for Remote and Secure Productivity with ZTNA

Preparing for business continuity and disaster recovery is vital for any organization. An important component of this is the ability to support a mostly or fully remote workforce with little or no notice.

When developing business continuity plans, it is essential to ensure that the organization has the resources in place to secure this remote workforce. Fortinet solutions are easily deployable and configurable and enable an organization to maintain full security, visibility, and control, regardless of their deployment environment.

Participants who attend this workshop will learn how to:

  • Configure two-factor authentication, which is necessary for secure access
  • Create an inbound VPN policy on FortiGate that allows teleworkers to tunnel back to corporate headquarters
  • Configure FortiClient Endpoint Management Server (EMS) to protect remote users as effectively as if they were located at the corporate office
  • Configure Zero Trust tags, ZTNA server, rules and full mode ZTNA policy to perform context based posture checks for providing application access
  • Demonstrate successful operation of these critical functions
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience to understand how to easy it is to deploy, configure, and enable an organization to maintain full security, visibility, and control regardless of your deployment environment.

The Evolution of Access to Applications with Fortinet ZTNA

Zero Trust Network Access (ZTNA) is an access control method that uses client device identification, authentication, and Zero Trust tags to provide role-based application access. It gives administrators the flexibility to manage network access for On-net local users and Off-net remote users. Access to applications is granted only after device verification, authenticating the user’s identity, authorizing the user, and then performing context based posture checks using Zero Trust tags.

Participants who attend this workshop will learn how to:

  • Integrate FortiClient Endpoint Management Server (EMS) into Security Fabric.
  • Configure EMS Zero Trust policies and rules to protect corporate and remote users.
  • Configure FortiClient Endpoint Management Server (EMS) to protect remote users as effectively as if they were located at the corporate office
  • Configure ZTNA HTTPS Access Proxy for secure remote access to applications.
  • Configure ZTNA IP/MAC Based Access Control for On-net dynamic access.
  • Demonstrate successful operation of these critical functions.
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience to understand how to easy it is to deploy, configure, and enable an organization to maintain full security, visibility, and control regardless of your deployment environment.

Proactive Advanced Endpoint Protection, Visibility, and Control for Critical Assets Including ZTNA

Endpoints are frequently the target of initial compromise or attacks. One recent study found that 30% of breaches involved malware being installed on endpoints. Fortinet endpoint solutions strengthen endpoint security through integrated visibility, control, and proactive defense.

FortiClient can discover, monitor, and assess endpoint risks, so you can ensure endpoint compliance, mitigate risks, and reduce exposure. Its tight integration with the Fortinet Security Fabric enables policy-based automation to contain threats and control outbreaks. FortiClient also provides secure remote access with built-in VPN, single-sign-on, and two-factor authentication for added security.

FortiEDR delivers advanced, real-time threat protection for endpoints both pre- and post-infection. It proactively reduces the attack surface, prevents malware infection, detects and defuses potential threats in real time, and can automate response and remediation procedures with customizable playbooks.

Participants who attend this workshop will learn how to:

  • Integrate FortiClient EMS into the Security Fabric
  • Use the FortiClient anti-exploit feature to prevent attacks proactively
  • Configure FortiClient EMS to apply tags to endpoints that FortiGate can use to dynamically control access to subnets
  • Filter, sort and, view events in FortiEDR
  • Perform forensic analysis in FortiEDR
Format 4-hour technical workshop
Objective Provide a compelling hands-on learning experience to understand how to strengthen endpoint security through integrated visibility, control, and proactive defense.

Identity and Access Management

Today’s business environments are made up of various systems ranging from networking devices, servers, directory services, and cloud applications. Managing an identity that resides in each of these various systems can quickly grow into such a large administrative challenge that it negatively affects users, administrators, and application developers.

Many of today’s most damaging security breaches have been due to compromised user accounts and passwords, exacerbated by groups of users being provided with inappropriate levels of access. Securely, and effectively managing identity authentication and authorization policies for all systems and applications, is crucial to protect against security breaches. FortiAuthenticator provides services that are key in creating effective security policies and strengthening security by ensuring only the right person, at the right time, can access your sensitive networks and data.

Participants who attend this workshop will learn how to:

  • Configure FortiAuthenticator integration with an existing LDAP
  • Configure FortiAuthenticator Fortinet Single-Sign-On using windows event polling and windows mobility agent
  • Complete certificate management for an enterprise including CA certificate creation
  • Generate a FortiGate HTTPS certificate request and signing it using FortiAuthenticator SCEP
  • Finally, you will be configuring webserver administrator access with 2FA using RADIUS
Format 4-hour technical workshop
Objective Provide a compelling, hands-on learning experience about the Fortinet Identity solution and demonstrate to participants how to manage user identity with the Fortinet FortiAuthenticator solution, which solves the challenges of today’s highly adaptive threat landscape, provides enhanced visibility into user activity.
  • Library
  • Schedule
You are not logged in. (Log in)
  • Library
  • Schedule
  • Certifications
  • ATC
  • Academic Partner Program
  • Fast Track Workshops
Data retention summary